|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200405-07] Exim verify=header_syntax buffer overflow Vulnerability Assessment Details
|
[GLSA-200405-07] Exim verify=header_syntax buffer overflow |
||
Exim verify=header_syntax buffer overflow Detailed Explanation for this Vulnerability Assessment The remote host is affected by the vulnerability described in GLSA-200405-07 (Exim verify=header_syntax buffer overflow) When the option "verify = header_syntax" is used in an ACL in the configuration file, Exim is vulnerable to a buffer overflow attack that can be triggered remotely by sending malicious headers in an email message. Note that this option is not enabled in Exim's default configuration file. Impact This vulnerability can be exploited to trigger a denial of service attack and potentially execute arbitrary code with the rights of the user used by the Exim daemon (by default this is the "mail" user in Gentoo Linux). Workaround Make sure the verify=header_syntax option is not used in your exim.conf file. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0400 Solution: All users of Exim should upgrade to the latest stable version: # emerge sync # emerge -pv ">=net-mail/exim-4.33-r1" # emerge ">=net-mail/exim-4.33-r1" Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: (C) 2005 Michel Arboi |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |